Torrent details for "CBTNuggets ISACA CISM Certified Information Security Manager" Log in to bookmark
Controls:
×
Report Torrent
Please select a reason for reporting this torrent:
Your report will be reviewed by our moderation team.
×
Report Information
Loading report information...
This torrent has been reported 0 times.
Report Summary:
| User | Reason | Date |
|---|
Failed to load report information.
×
Success
Your report has been submitted successfully.
Checked by:
Category:
Language:
English
Total Size:
1.8 GB
Info Hash:
6819F87F2F4DAEEA7F85085FCC058416C394D88B
Added By:
Added:
July 10, 2025, 7 a.m.
Stats:
|
(Last updated: Oct. 22, 2025, 2:44 p.m.)
| File | Size |
|---|---|
| Get Bonus Downloads Here.url | 180 bytes |
| 1. Organizational Culture.mp4 | 13.6 MB |
| 2. Security Governance 1.mp4 | 19.4 MB |
| 3. Security Governance 2.mp4 | 15.3 MB |
| 4. The Importance of Strategy 1.mp4 | 16.8 MB |
| 5. The Importance of Strategy 2.mp4 | 13.7 MB |
| 6. Information Security Frameworks.mp4 | 14.3 MB |
| 7. Strategic Objectives.mp4 | 18.1 MB |
| 8. Business Model for Information Security (BMIS).mp4 | 12.6 MB |
| 1. Security Operations Centers (SOCs) 1.mp4 | 22.8 MB |
| 2. Security Operations Centers (SOCs) 2.mp4 | 17.0 MB |
| 3. Vulnerability and Patch Management.mp4 | 10.4 MB |
| 4. Protecting Networks Pt.1.mp4 | 28.4 MB |
| 5. Protecting Networks Pt.2.mp4 | 33.8 MB |
| 6. Content Filtering Solutions.mp4 | 20.7 MB |
| 7. Endpoint Protection and Management.mp4 | 16.6 MB |
| 1. Secure Software Development.mp4 | 14.3 MB |
| 2. Identity & Access Management (IAM) 1.mp4 | 29.2 MB |
| 3. Identity & Access Management (IAM) 2.mp4 | 11.9 MB |
| 4. Security Awareness Training and MSSPs.mp4 | 23.6 MB |
| 5. Data Backup and Recovery.mp4 | 31.7 MB |
| 6. Financial and Capacity Management.mp4 | 21.3 MB |
| 1. Security Controls.mp4 | 16.3 MB |
| 2. Categories Of Security Controls.mp4 | 13.8 MB |
| 3. Security Control Functions.mp4 | 10.6 MB |
| 4. Testing Security Controls.mp4 | 16.6 MB |
| 5. Security Control Objectives and Frameworks.mp4 | 14.7 MB |
| 6. Designing Security Controls.mp4 | 10.9 MB |
| 7. Key Performance Indicators (KPIs).mp4 | 16.7 MB |
| 1. Phases Of Incident Response.mp4 | 15.7 MB |
| 2. Incident Response Preparation.mp4 | 18.8 MB |
| 3. Incident Response Planning.mp4 | 19.0 MB |
| 4. Detection, Initiation and Evaluation Of Incidents.mp4 | 17.1 MB |
| 5. Containment, Eradication and Recovery.mp4 | 11.1 MB |
| 6. Post Incident Activities.mp4 | 11.2 MB |
| 7. Incident Response Resources.mp4 | 12.7 MB |
| 1. BC and DR Planning (BCDR).mp4 | 8.6 MB |
| 2. The BCDR Planning Process.mp4 | 16.7 MB |
| 3. Creating a BC Plan.mp4 | 12.6 MB |
| 4. DR Planning.mp4 | 26.3 MB |
| 5. Resiliency Technologies.mp4 | 19.4 MB |
| 6. BCDR Testing.mp4 | 8.4 MB |
| 7. BCDR Resources.mp4 | 17.1 MB |
| 1. The P3 Policies, Processes and Procedures.mp4 | 22.1 MB |
| 2. Standards, Guidelines and Architecture.mp4 | 23.8 MB |
| 3. Controls, Metrics and Assets.mp4 | 19.9 MB |
| 4. Risk Ledgers, Vulnerability Assessments and Insurance.mp4 | 14.5 MB |
| 5. Critical Data, BIA's and BCDR Planning.mp4 | 22.7 MB |
| 6. Incident Logs and Audits.mp4 | 10.9 MB |
| 7. Information Security Training, 3rd Party Risk and LCR Requirements.mp4 | 19.8 MB |
| 1. Creating A Business Case 1.mp4 | 22.6 MB |
| 2. Creating A Business Case 2.mp4 | 8.7 MB |
| 3. Communications and Reporting.mp4 | 22.0 MB |
| 4. How To Communicate Technical Information.mp4 | 15.7 MB |
| 5. Commitment From Management.mp4 | 34.9 MB |
| 6. End User Information Security Training.mp4 | 23.2 MB |
| 7. Causes Of Failure To Avoid.mp4 | 23.1 MB |
| 1. Organization Level Roles.mp4 | 29.0 MB |
| 2. Roles Pertaining To Our Data.mp4 | 9.6 MB |
| 3. The World of Metrics.mp4 | 11.0 MB |
| 4. Metrics Scenario 1.mp4 | 17.9 MB |
| 5. Metrics Scenario 2.mp4 | 17.0 MB |
| 6. Have We Achieved Success.mp4 | 11.1 MB |
| 7. DAD Triad.mp4 | 5.0 MB |
| 1. The Role of Risk Managent.mp4 | 18.0 MB |
| 2. Risk Management Frameworks.mp4 | 24.7 MB |
| 3. Risk Management Strategy 1.mp4 | 21.4 MB |
| 4. Risk Management Strategy 2.mp4 | 14.6 MB |
| 5. Analyzing Risk 1.mp4 | 27.6 MB |
| 6. Analyzing Risk 2.mp4 | 13.8 MB |
| 7. Risk Analysis Techniques.mp4 | 16.1 MB |
| 8. Dealing With Risk.mp4 | 30.1 MB |
| 1. Risk Management Activities.mp4 | 19.8 MB |
| 2. NIST SP 800-39 Managing Information Security Risk.mp4 | 30.2 MB |
| 3. NIST SP 800-30 Guide For Conducting Risk Assessments.mp4 | 22.6 MB |
| 4. ISOIEC 27005 Guidance On Managing IS Risk.mp4 | 21.1 MB |
| 5. Factor Analysis of Information Risk (FAIR).mp4 | 19.3 MB |
| 6. Risk Management Walk-Through.mp4 | 17.0 MB |
| 1. Hardware, Software and Information Assets.mp4 | 27.3 MB |
| 2. Cloud and Virtual Assets.mp4 | 25.7 MB |
| 3. Asset Information and Classification 1.mp4 | 18.1 MB |
| 4. Asset Information and Classification 2.mp4 | 12.0 MB |
| 5. Identifying Threats To Assets 1.mp4 | 18.6 MB |
| 6. Identifying Threats To Assets 2.mp4 | 16.0 MB |
| 7. Identifying Asset Vulnerabilities.mp4 | 19.4 MB |
| 8. Bonus Nugget Nessus Vulnerability Scanner.mp4 | 33.8 MB |
| 1. Risk Management Objectives Pt.1.mp4 | 24.7 MB |
| 2. Risk Management Objectives Pt.2.mp4 | 25.9 MB |
| 3. Third Party Risk Management Pt.1.mp4 | 30.0 MB |
| 4. Third Party Risk Management Pt.2.mp4 | 19.8 MB |
| 5. The Risk Register.mp4 | 12.5 MB |
| 6. Integrating Risk Management Into Other Processes.mp4 | 20.4 MB |
| 7. Risk Monitoring and Reporting.mp4 | 22.2 MB |
| 1. Building Blocks Of An Information Security Program.mp4 | 15.8 MB |
| 2. Information Security Program Details.mp4 | 16.2 MB |
| 3. Information Security Architecture.mp4 | 21.0 MB |
| 4. Security Program Management 1.mp4 | 21.9 MB |
| 5. Security Program Management 2.mp4 | 15.9 MB |
| 6. Security Policies.mp4 | 10.8 MB |
| 7. Working With Resources.mp4 | 22.5 MB |
| Bonus Resources.txt | 70 bytes |
Name
DL
Uploader
Size
S/L
Added
NOTE
SOURCE: CBTNuggets ISACA CISM Certified Information Security Manager
-----------------------------------------------------------------------------------
COVER

-----------------------------------------------------------------------------------
MEDIAINFO
None
×


